- November 18, 2013
Dodd-Frank conflict mineral provisions create new disclosure rules for public companies. In this tip, learn how to prepare for the regulations.
- November 07, 2013
New electronic document management software offerings can give the record manager efficiency and security in integration and maintenance efforts.
- November 05, 2013
In this Q&A with ARMA 2013 speaker Veeral Gosalia, learn how mobile devices and the cloud complicate how organizations approach e-discovery strategy.
- October 25, 2013
The controversy surrounding U.S.-based online surveillance continues, as more revelations concerning NSA data-gathering activities come to light.
- October 16, 2013
In this ISSA conference recap, we look at security roadmap development, identity systems, and the link between government and corporate cybersecurity.
Sponsored by DellEMC - Security is the utmost priority for IT decision-makers in state and local government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data that is extremely valuable on the Dark Web, such as Social Security numbers. See More
Sponsored by DellEMC - Artificial intelligence has the potential to transform how public sector and educational institutions operate, innovate and serve the needs of their constituents. When used strategically, AI can enable greater efficiencies, eliminate silos, strengthen cybersecurity and help organizations unlock the value of their data. See More
Sponsored by DellEMC - Every organization in every industry is creating massive volumes of data. The goal of many IT modernization efforts is to ensure that the organization can harness the value of that data to understand powerful insights, increase efficiencies and drive innovations. See More
Sponsored by DellEMC - When it comes to updating aging technology and embracing a new digital world, educational institutions are faced with the same pressures as commercial businesses. Today’s users—especially younger generations—demand digital experiences that are simple, fast and mobile. See More
- October 14, 2013
ISSA International Conference attendees talked whistleblowing, geolocation threats, real-time risk and more on Twitter during the Nashville gathering.
- October 14, 2013
In our latest Product Spotlight, we shine a light on secure file transfer services and systems that reduce risk and emphasize compliance.
- September 26, 2013
Organizers of next month's ISSA International Conference discuss what attendees can expect from the event and the current cybersecurity strategy landscape.
- September 23, 2013
- September 16, 2013
In this Product Spotlight, we cover two new cloud security products designed to bolster enterprise risk management programs.
- September 04, 2013
(This blog post was written by Marilyn Bier, chief executive officer for ARMA International.) All organizations depend on information to manage day-to-day operations, comply with regulations, gauge ...
- August 29, 2013
The online debate surrounding the NSA's data-gathering activities persists, as revelations surrounding the PRISM program continue to come to light.
- August 26, 2013
Big data presents numerous data governance challenges: Regulatory compliance, information security and risk management and are all complicated by the amount of data generated by the average ...
- August 15, 2013
As both government and businesses seek to confront online risk, the worldwide cybersecurity strategy debate continues via social media.
- August 08, 2013
In this Product Spotlight, we look at two new risk management assessment tools intended to better secure and protect your organization's private data.